3. Setup logs
If any problems occur during the installation, you can usually
find the reason in the files the installation procedure places in the
\ExchangeSetupLogs folder. The contents of the main installation log,
ExchangeSetup.log, are quite interesting to review because you can find
details there of all the commands used to install Exchange on a server,
including the changes applied to Active Directory. Exchange is
tremendously verbose in terms of the information written into the setup
log. The log is broken into major activities, which are indicated by a
long line of asterisks, and minor activities, which are indicated by a
shorter line. Initialization of the installation process is a major
activity; running a Windows PowerShell script to perform a single task
is a minor activity.
As a glance at Figure 3
reveals, there’s a mass of data within the setup log. Most of the data
captured in the logs are not useful unless you encounter a problem
during an installation and need to find out why the problem occurred.
Even so, most of the information you’ll need is right at the end of the
log, where you’ll see details of the problem the setup program
experienced and the actions it took to unwind the installation. The
remainder of the data in the log is unlikely to be looked at by anyone
except a support specialist who’s tracking down an elusive problem.
In
addition to the setup logs, the ExchangeSetupLogs folder contains a
number of Windows PowerShell scripts that the installation procedure
generates to perform different steps, including the configuration of
the various server roles installed on the server. The fact that
Exchange uses Windows PowerShell in this manner underscores the
importance of scripting to the product, as do the many examples of
scripts built to perform uninstalled installations.
If problems
persist and you can’t install Exchange, or if Exchange doesn’t work as
expected after the installation, Microsoft support is likely to ask you
to provide information such as the installation logs and the server’s
application event log to enable the support team to understand what
happened and fix any problems. The team might also ask you to run the
Exchange Trace Analyzer utility (ExTRA) to gather debugging
information. ExTRA runs in the background to gather information about
Windows and Exchange at an additional level of detail.
Tip
One
small detail that occurs during an installation is that the path for
executables is updated with the location of the Exchange binaries. This
is a nice feature because it avoids the need for administrators to
search file locations when they want to run Exchange utilities such as
Eseutil.exe.
No
one would ever remove Exchange from a computer unless it was a test box
or it was time to decommission the server after upgrading to a new
release. If you need to remove Exchange, however, two methods are
available to uninstall a single role, multiple roles, or a complete
Exchange server:
Run
Setup.com from the command line. For example, to remove Exchange 2013
from a server, run the Setup.com /Mode:Uninstall command.
In
Control Panel, click Uninstall A Program and then select Exchange 2013
from the list of programs. This invokes the GUI setup program in
uninstall mode.
Note that unlike Exchange 2010,
Exchange 2013 does not support the removal of a single role from a
server; you must remove Exchange completely and then reinstall the role
you want to keep. When the time comes to remove roles or a complete
server, the first step is to ensure that data is transferred off the
server before you run Setup. Although this is not a comprehensive
checklist, these steps are among those you should review before you
decommission a server:
Move
mailboxes to databases on other servers (or move complete databases if
the server is a member of a DAG). Disable automatic database activation
on the server to prevent the DAG from activating any copies that remain
on the server.
Exclude the
mailbox databases on the server from automatic provisioning so that an
administrator does not inadvertently create new mailboxes in those
servers.
After
all mailboxes, including system mailboxes such as discovery search and
arbitration mailboxes, have been moved from the databases, dismount and
remove the databases.
Remove the server from its DAG if it is a member.
Clear any outstanding move requests for databases hosted by the server.
Disable group metrics generation and make sure that another server in the organization takes on this task.
Remove the server from any send connectors for which it is a source.
If
the server being removed is a CAS, ensure that connectivity (external
and internal) for all supported client types will continue to function.
After
you relocate mailboxes, it’s wise to leave the server in place for a
couple of days to check that everything continues to run smoothly. You
should check the event logs on the server to be decommissioned and on
the servers to which you have transferred work to ensure that no
problems are flagged. You could then take the server offline for a
period to see whether anything breaks. Finally, after you are sure that
everything is ready to proceed and no lurking problems exist, you can
run Setup in removal mode.